<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Certain nonfederal organizations need to be compliant with the requirements laid out in NIST SP 800-171 by this deadline. Learn more

NIST Compliance - Are You Ready? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Disaster Recovery

Learn From Equifax's Most Recent Security Breach

By: Matt Kozloski
October 5th, 2017

Equifax made some serious mishaps lately, both technically and incident response. What’s really disturbing:  while this is the largest, this is not an isolated incident. We won’t cover the details here, since there are plenty of sources where you can find information about the breach, its consequences, and what has happened after that. What we will cover is some thoughts around what we can all learn from the events leading up to, during, and after the breach.  At Kelser, we don’t want any company to fall victim to the same incident and aftermath that Equifax did.  We match our recommendations to our clients’ business objectives, establishing a comprehensive and multi-layered strategy to manage risk before, during and after a cybersecurity incident.

Read More

Share

Blog Feature

Executive Consulting | BCDRaaS

How to Make Sure You Have Disaster-Ready Data Backups

By: Matt Kozloski
September 25th, 2017

Backing up your data is a necessity. There are simply too many ways in which data can be lost, ransomed, or compromised in some way. Your original information can get deleted - by accident or on purpose. Your system or network can fail. A hurricane or tornado can strike.   That’s why you have another copy safe and sound. It’s why you also have a disaster recovery plan in place to make sure your data is safe. You do have a disaster recovery plan, right?

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Business Continuity | BCDRaaS | Disaster Recovery

Kelser - Proud of Our Partners

By: Kelser
September 13th, 2017

You trust Kelser to help solve your business problems and leverage technology to move your business forward. Similarly, we trust our Partners to offer us best-of-breed solutions to help us achieve these goals. That’s why we choose to work with the best in the industry and we wanted to applaud one of them, Datto, for their recent efforts.

Read More

Share

Blog Feature

Cybersecurity

Secure IT Asset Disposition: How to Keep Your Data Safe

By: Matt Kozloski
August 17th, 2017

As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?

Read More

Share

Blog Feature

Cybersecurity | Executive Consulting

NIST 800-171 Implementation for Connecticut Companies

By: Matt Kozloski
August 10th, 2017

Trust can be a precarious thing. One mistake could ruin it forever. You spend so much time and energy building trust with your customers, vendors, contractors, and partners, that the last thing you want to do is lose it, particularly over non-compliance. Believe it or not, record keeping and data handling is critical to maintaining that trust.

Read More

Share

Blog Feature

Cybersecurity

5 Causes of Costly Cybersecurity Breaches in the Healthcare Industry

By: Matt Kozloski
July 20th, 2017

Welcome to 2017, a time in which no industry is uninfluenced by technological advancement. The healthcare sector has moved forward with million dollar investments that revolutionized the way we treat patients. But it’s also been transformed by technology that’s changed how providers and facilities create and manage electronic health records. Technological advancements also bring new risks. Take the adoption of IoT-enabled medical equipment, for example. While these devices offer valuable functionality, they introduce new cybersecurity challenges. With these factors and the scores of personal information they handle, hospitals and healthcare practices bear greater risks of cybersecurity breaches.

Read More

Share